QUESTION 56Refer to the exhibit, which effect of this configuration is true?

A. The PMTUD value sets itself to 1452 bytes when the interface MTU is set to 1492 bytesB. SYN packets carries 1452 bytes in the payload when the Ethernet MTU of the interface is set to 1492 bytesC. The maximum size of TCP SYN+ACK packets passing the transient host is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytesD. The MSS to TCP SYN packets is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytesE. The minimum size of TCP SYN+ACL packets passing the router is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes

Answer: D

QUESTION 57Which of the following statement is true about the ARP spoofing attack?

A. Attacker sends the ARP request with the MAC address and IP address of the legitimate resource in the network.B. Attacker of ends the ARP request with MAC address and IP address of its own.C. ARP spoofing does not facilitate man in-the-middle attack for the attacker.D. Attacker sends the ARP request with its own MAC address and IP address of legitimate resource in the network.

Answer: D

QUESTION 58Which command can you enter to cause the locally-originated Multicast Source Discovery Protocol Source-Active to be prevented from going to specific peers?

A. It allows the receiver of a packet to control its flow.B. It allows the sender to generate multiple NDP requests for each packet.C. It allows the sender of a packet to control its flow.D. It allows the sender to generate multiple ARP requests for each packet.E. It allows the receiver of a packet to modify the source IP address.

Answer: C

QUESTION 64What context-based access control (CBAC. command sets the maximum time that a router running Cisco IOS Will wait for a new TCP session to reach the established state?

A. The packet information used to create flows is not configurable by the user.B. It supports IPv4 and IPv6 packet fields.C. It tracks all fields of an IPv4 header as well as sections of the data payload.D. It uses two types of flow cache, normal and permanent.E. It can be a useful tool in monitoring the network for attacks.